5 Commits

Author SHA1 Message Date
5165759558 add JWT secret reference
Some checks failed
Ruby Lint / lint (push) Successful in 20s
Ruby Test / test (push) Successful in 24s
Release / docker (push) Has been cancelled
2025-05-10 18:13:02 -05:00
10f73b96ec refer to the session secret using the application name prefix 2025-05-10 18:12:37 -05:00
5097e551e2 just call the Kubernetes secret "kubernaut" 2025-05-10 18:10:50 -05:00
820d2d8c51 move secret related contstants to Config class
Some checks failed
Ruby Lint / lint (push) Failing after 13s
Ruby Test / test (push) Successful in 16s
2025-05-10 17:46:46 -05:00
eb5c12ca91 remove secret from Kustomize 2025-05-10 17:46:46 -05:00
5 changed files with 12 additions and 21 deletions

2
app.rb
View File

@ -24,8 +24,6 @@ require "config"
VERSION = "0.2.1"
CHUNK_SIZE = 1024**2
SESSION_SECRET_HEX_LENGTH = 64
JWT_SECRET_HEX_LENGTH = 64
DEFAULT_FLAKEY = 50
NAME = "kubernaut".freeze

View File

@ -22,12 +22,18 @@ spec:
- name: sinatra-web
containerPort: 4567
env:
- name: SESSION_SECRET
- name: KUBERNAUT_SESSION_SECRET
valueFrom:
secretKeyRef:
name: kubernaut-session-secret
name: kubernaut
key: session_secret
optional: true
- name: KUBERNAUT_JWT_SECRET
valueFrom:
secretKeyRef:
name: kubernaut
key: jwt_secret
optional: true
envFrom:
- configMapRef:
name: kubernaut-configmap

View File

@ -3,7 +3,6 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
namespace: kubernaut
resources:
- secret.yaml
- configmap.yaml
- deployment.yaml
- hpa.yaml

View File

@ -1,15 +0,0 @@
---
apiVersion: bitnami.com/v1alpha1
kind: SealedSecret
metadata:
creationTimestamp: null
name: kubernaut-session-secret
namespace: kubernaut
spec:
encryptedData:
session_secret: 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
template:
metadata:
creationTimestamp: null
name: kubernaut-session-secret
namespace: kubernaut

View File

@ -1,5 +1,8 @@
require "sensitive"
SESSION_SECRET_HEX_LENGTH = 64
JWT_SECRET_HEX_LENGTH = 64
class Config
attr_accessor :cat
@ -9,7 +12,7 @@ class Config
@prefix = prefix
@cat = cat
session_secret ||= ENV.fetch "SESSION_SECRET" do
session_secret ||= fetch_env "SESSION_SECRET" do
SecureRandom.hex SESSION_SECRET_HEX_LENGTH
end